It is a while since I have highlighted Android malware – TrickMo attracted my attention for the simplicity of just imitating lock screens to steal your information. TrickMo malware steals Android PINs using fake lock screen (bleepingcomputer.com) But the malware does not stop there it among the malicious tasks it …
I don’t give a …
This story is about the wise decision I made many years ago and have been preaching on this site and Octagon Technology and CyberAwake and every course and talk I have given. The Internet Archive and Wayback Machine webistes have been hacked and the user authentication database containing 31 million …
Password Rules
Not for you but for developers and programmers. I they do not set effective password parameters then it can be too easy for a user to take a shortcut to a poor password and poor cyber security. NIST Recommends Some Common-Sense Password Rules – Schneier on Security Your Takeaway If …
Problems with QR Codes
Diana has written this week’s “Wednesday Bit” on QR Codes. Last week I became aware of a significant problem with QR codes, which are used by many organisations and individuals to direct people to their websites or sales pages. Such codes have been in use now for many years. (BizTechReports, …
Another thing about phishing emails… (pt.12)
A few months ago, I wrote a Back-to-Basics mini-series on phishing emails, how they impact organisations and what you can do to reduce the risks. Back-to-Basics – A Phishing Email Primer | Smart Thinking Solutions Phish Attacks – the deluge never stops Every week I read articles on the latest …
Continue reading “Another thing about phishing emails… (pt.12)”